CN113129466B - Check-in verification method, check-in verification device and electronic equipment - Google Patents
Check-in verification method, check-in verification device and electronic equipment Download PDFInfo
- Publication number
- CN113129466B CN113129466B CN202010026470.0A CN202010026470A CN113129466B CN 113129466 B CN113129466 B CN 113129466B CN 202010026470 A CN202010026470 A CN 202010026470A CN 113129466 B CN113129466 B CN 113129466B
- Authority
- CN
- China
- Prior art keywords
- short
- terminal
- range communication
- check
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/10—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
- G07C1/12—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity wherein the time is indicated in figures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A check-in verification method, a check-in verification device and electronic equipment are disclosed. The sign-in verification method is applied to a first terminal and comprises the following steps: receiving a short-range communication identification of a second terminal from the second terminal of a check-in object, wherein the short-range communication identification is encrypted; decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal; receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and decrypting the short-range communication signal to perform check-in verification based on the identification of the check-in object. In this way, the accuracy of check-in verification is improved.
Description
Technical Field
The present disclosure relates to the field of information verification technologies, and more particularly, to a check-in verification method, a check-in verification device, and an electronic apparatus.
Background
In many service scenarios, a service person is required to check in. For example, in some business scenarios, a salesman is required to check in to a small store using the service and complete the relevant business. However, due to inaccurate latitude and longitude of the GPS in the small store and weak indoor signals of the GPS, the accuracy of the current sign-in position using the GPS is low, for example, the sign-in task performed by the current salesman can only be performed within a range of about 700 meters from the vicinity of the GPS address of the small store.
However, with this business vulnerability, there is data that indicates that, especially when doing shelf tasks, some businesses will perform all the tasks of nearby stores in the same store, because the stores are not more than 700 meters apart, and thus it is not possible to accurately distinguish whether check-in is performed for each store, which affects the business data and affects the quality of service of the businesses.
It is therefore desirable to provide an improved check-in verification.
Disclosure of Invention
The present application has been made in order to solve the above technical problems. The embodiment of the application provides a check-in verification method, a check-in verification device and electronic equipment, which are used for performing short-distance communication connection with a preset terminal of a check-in object by receiving an encrypted short-distance communication identifier, and further performing check-in verification based on the identifier of the check-in object, so that the accuracy of the check-in verification is improved.
According to an aspect of the present application, there is provided a check-in verification method applied to a first terminal, including: receiving a short-range communication identification of a second terminal from the second terminal of a check-in object, wherein the short-range communication identification is encrypted; decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal; receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and decrypting the short-range communication signal to perform check-in verification based on the identification of the check-in object.
In the above sign-in verification method, the short-range communication identification of the second terminal is a random number randomly generated for the sign-in object, and the device name broadcasted by the second terminal via the broadcast for short-range communication contains the random number.
In the sign-in verification method, the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal.
In the sign-in verification method, receiving the encrypted short-distance communication identifier of the second terminal from the second terminal of the sign-in object includes: scanning a two-dimensional code, wherein the two-dimensional code comprises a short-distance communication identifier of the second terminal; and decrypting the random number with the public key to obtain a short-range communication identifier of the second terminal.
In the sign-in verification method, decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal includes: opening the authority of short-distance communication; scanning signals of nearby short-range communication devices; and establishing short-distance communication connection with the second terminal with the equipment name containing the random number.
In the above sign-in verification method, after scanning the device signal of the near short-distance communication, further comprising: in response to a device not scanning for a short-range communication whose device name contains the random number within a predetermined time, check-in with the check-in object is performed via a manner other than the short-range communication.
In the above sign-in verification method, decrypting the short-range communication signal to perform sign-in verification based on the identification of the sign-in object includes: decrypting the short-range communication signal to obtain an identification of the check-in object; matching the identification of the sign-in object with the identification of the task object; and, in response to the match being successful, determining that the task was successfully performed.
In the check-in verification method, decrypting the bluetooth signal to perform check-in verification based on the identification of the check-in object further includes: in response to a match failure, a prompt is made to continue to perform the task.
In the above sign-in verification method, before receiving the short-distance communication identifier of the second terminal from the second terminal of the sign-in object, the method further includes: positioning the second terminal in a remote positioning mode; and reaching the second terminal within a predetermined distance.
According to another aspect of the present application, there is provided a check-in verification method applied to a first terminal of a retail store service person, including: receiving a short-range communication identification of a second terminal from a second terminal of a retail store owner, the short-range communication identification being encrypted; decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal; receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and decrypting the short-range communication signal to verify check-in based on the identity of the retail outlet owner.
In the sign-in verification method, receiving the encrypted short-distance communication identifier of the second terminal from the second terminal of the retail store owner comprises: scanning a two-dimensional code of the retail store owner, wherein the two-dimensional code comprises a short-distance communication identifier of the second terminal; and decrypting the random number with the public key to obtain a short-range communication identifier of the second terminal.
In the above check-in verification method, decrypting the short-range communication signal to perform check-in verification based on the identity of the retail store owner includes: decrypting the short-range communication signal to obtain an identification of the retail outlet owner; matching the identification of the retail store owner with the identification of the task object; and, in response to the match being successful, determining that the task was successfully performed.
In the sign-in verification method, the identification of the retail store owner comprises a store owner identification of the retail store owner or a store identification of a retail store of the retail store owner.
According to still another aspect of the present application, there is provided a check-in verification method applied to a second terminal, including: establishing a short-range communication connection with a first terminal in response to a short-range communication connection request of the first terminal, the short-range communication connection request being based on a short-range communication identification of the second terminal, the short-range communication identification being encrypted; transmitting an encrypted short-range communication signal to the first terminal via the established short-range communication connection; a kind of electronic device with a high-pressure air-conditioning system. And verifying check-in performed by the first terminal.
In the sign-in verification method, before the short-distance communication connection is established with the first terminal in response to the short-distance communication connection request of the first terminal, the method further comprises: and broadcasting the equipment name of the second terminal in a broadcasting mode for short-distance communication, wherein the equipment name comprises a random number which is randomly generated for a sign-in object corresponding to the second terminal.
In the sign-in verification method, the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal.
According to yet another aspect of the present application, there is provided a check-in verification system including: the first terminal is used for signing in; and a second terminal corresponding to the check-in object; the first terminal is configured to receive a short-range communication identifier of the second terminal from the second terminal, where the short-range communication identifier is encrypted; decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal; receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and decrypting the short-range communication signal to perform check-in verification based on the identification of the check-in object.
According to another aspect of the present application, there is provided a person check-in method applied to a first terminal of a person to be checked in, including: receiving, by the first terminal, a short-range communication identification of a person who checked in to the object from a second terminal of the second terminal, the short-range communication identification being encrypted; decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal; receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and decrypting the short-range communication signal to perform check-in verification based on the identification of the check-in object.
In the above person check-in method, the person of the check-in object is a tour guide, a teacher, or other management person or team member.
In the person check-in method described above, receiving, by a first terminal of a person to be checked-in, a short-range communication identification of a second terminal of a person to be checked-in from the second terminal includes: scanning a two-dimensional code, wherein the two-dimensional code comprises a short-distance communication identifier of the second terminal.
In the personnel check-in method, the two-dimensional code comprises a two-dimensional code displayed on a mobile terminal of the personnel of the check-in object or a two-dimensional code fixedly displayed at a check-in place.
In the personnel check-in method, further comprising: storing the received short-distance communication identification of the second terminal; and establishing a short-range communication connection with the second terminal based on the stored short-range communication identifier of the second terminal.
According to still another aspect of the present application, there is provided a person check-in method applied to a second terminal of a check-in manager, including: establishing short-distance communication connection with a first terminal in response to a short-distance communication connection request of the first terminal, wherein the first terminal is a first terminal of a person to sign in, and the short-distance communication connection request is based on a short-distance communication identification of the second terminal; transmitting an encrypted short-range communication signal to the first terminal via the established short-range communication connection; verifying a check-in signal of the first terminal, the check-in signal being based on the decrypted short-range communication signal; and managing a person to check in based on the verified check-in signal.
In the above person check-in method, managing the person to be checked-in based on the verified check-in signal includes managing at least one of the following check-in information: the number of people who have checked in and/or who have not checked in; person identification of persons who have checked in and/or persons who have not checked in; the check-in time of the person who has checked in; and a historical check-in time for the person who has checked-in and/or the person who has not checked-in.
In the above person check-in method, managing the person to be checked-in based on the verified check-in signal further includes: and sending a reminding signal to the first terminal of the person who does not sign in.
In the personnel check-in method, further comprising: and displaying the check-in information on a display device of the second terminal.
According to still another aspect of the present application, there is provided a check-in verification apparatus applied to a first terminal, including: an identification receiving unit configured to receive a short-range communication identification of a second terminal of a check-in object from the second terminal, the short-range communication identification being encrypted; a connection establishment unit configured to decrypt the short-range communication identifier to establish a short-range communication connection with the second terminal; a signal receiving unit for receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and a check-in verification unit configured to decrypt the short-range communication signal to perform check-in verification based on the identification of the check-in object.
In the above sign-in verification apparatus, the short-range communication identification of the second terminal is a random number randomly generated for the sign-in object, and the device name broadcasted by the second terminal via the broadcast for short-range communication contains the random number.
In the sign-in verification device, the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal.
In the sign-in verification device, the identification receiving unit is configured to: scanning a two-dimensional code, wherein the two-dimensional code comprises a short-distance communication identifier of the second terminal; and decrypting the random number with the public key to obtain a short-range communication identifier of the second terminal.
In the sign-in verification apparatus described above, the connection establishment unit is configured to: opening the authority of short-distance communication; scanning signals of nearby short-range communication devices; and establishing short-distance communication connection with the second terminal with the equipment name containing the random number.
In the above sign-in verification apparatus, the connection establishment unit is configured to, after scanning a device signal of near-proximity short-distance communication, perform sign-in with the sign-in object via a manner other than the short-distance communication in response to a device of short-distance communication whose device name contains the random number not being scanned for a predetermined time.
In the above sign-in verification device, the sign-in verification unit is configured to: decrypting the short-range communication signal to obtain an identification of the check-in object; matching the identification of the sign-in object with the identification of the task object; and, in response to the match being successful, determining that the task was successfully performed.
In the above sign-in verification apparatus, the sign-in verification unit further includes: in response to a match failure, a prompt is made to continue to perform the task.
The sign-in verification device further includes: a remote positioning unit, configured to position a second terminal of a sign-in object in a remote positioning manner before receiving a short-distance communication identifier of the second terminal from the second terminal; and reaching the second terminal within a predetermined distance.
According to still another aspect of the present application, there is provided a check-in verification apparatus applied to a first terminal of a retail store attendant, including: an identification receiving unit for receiving a short-range communication identification of a second terminal from a second terminal of a retail store owner, the short-range communication identification being encrypted; a connection establishment unit configured to decrypt the short-range communication identifier to establish a short-range communication connection with the second terminal; a signal receiving unit for receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and a check-in verification unit for decrypting the short-range communication signal to perform check-in verification based on the identification of the retail store owner.
In the sign-in verification device, the identification receiving unit is configured to: scanning a two-dimensional code of the retail store owner, wherein the two-dimensional code comprises a short-distance communication identifier of the second terminal; and decrypting the random number with the public key to obtain a short-range communication identifier of the second terminal.
In the above sign-in verification device, the sign-in verification unit is configured to: decrypting the short-range communication signal to obtain an identification of the retail outlet owner; matching the identification of the retail store owner with the identification of the task object; and, in response to the match being successful, determining that the task was successfully performed.
In the sign-in verification device, the identification of the retail store owner includes a store owner identification of the retail store owner or a store identification of a retail store of the retail store owner.
According to still another aspect of the present application, there is provided a check-in verification apparatus applied to a second terminal, including: a connection establishing unit configured to establish a short-range communication connection with a first terminal in response to a short-range communication connection request of the first terminal, the short-range communication connection request being based on a short-range communication identification of the second terminal, the short-range communication identification being encrypted; a signal transmitting unit configured to transmit an encrypted short-range communication signal to the first terminal via the established short-range communication connection; and a check-in verification unit, configured to verify check-in performed by the first terminal.
The sign-in verification device further includes: and a device broadcasting unit configured to broadcast a device name of the second terminal in a broadcast manner for short-range communication before a short-range communication connection is established with the first terminal in response to a short-range communication connection request of the first terminal, the device name including a random number randomly generated for a check-in object corresponding to the second terminal.
In the sign-in verification device, the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal.
According to still another aspect of the present application, there is provided a person check-in apparatus applied to a first terminal of a person to be checked in, including: an identification receiving unit for receiving, by the first terminal, a short-range communication identification of a person who is a sign-in object from a second terminal of the second terminal, the short-range communication identification being encrypted; a connection establishment unit configured to decrypt the short-range communication identifier to establish a short-range communication connection with the second terminal; a signal receiving unit for receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and a check-in verification unit configured to decrypt the short-range communication signal to perform check-in verification based on the identification of the check-in object.
In the above-described person check-in apparatus, the person to be checked-in is a tour guide, a teacher, or other management person or team member.
In the person check-in device, the identification receiving unit is configured to: scanning a two-dimensional code, wherein the two-dimensional code comprises a short-distance communication identifier of the second terminal.
In the personnel check-in device, the two-dimensional code comprises a two-dimensional code displayed on a mobile terminal of a personnel of the check-in object or a two-dimensional code fixedly displayed at a check-in place.
In the above personnel check-in device, further comprising: an identifier storage unit, configured to store the received short-distance communication identifier of the second terminal; and the connection establishment unit is used for establishing short-distance communication connection with the second terminal based on the stored short-distance communication identification of the second terminal.
According to still another aspect of the present application, there is provided a person check-in apparatus, applied to a second terminal of a check-in manager, including: a connection establishing unit, configured to establish a short-distance communication connection with a first terminal in response to a short-distance communication connection request of the first terminal, where the first terminal is a first terminal of a person to sign in, and the short-distance communication connection request is based on a short-distance communication identifier of the second terminal; a signal transmitting unit configured to transmit an encrypted short-range communication signal to the first terminal via the established short-range communication connection; a check-in verification unit configured to verify a check-in signal of the first terminal, the check-in signal being based on the decrypted short-range communication signal; and a person management unit configured to manage a person to check in based on the verified check-in signal.
In the above-described person check-in apparatus, the person management unit is configured to manage at least one of the following check-in information: the number of people who have checked in and/or who have not checked in; person identification of persons who have checked in and/or persons who have not checked in; the check-in time of the person who has checked in; and a historical check-in time for the person who has checked-in and/or the person who has not checked-in.
In the above person check-in device, the person management unit is further configured to: and sending a reminding signal to the first terminal of the person who does not sign in.
In the above personnel check-in device, further comprising: and the information display unit is used for displaying the check-in information on the display equipment of the second terminal.
According to still another aspect of the present application, there is provided an electronic apparatus including: a short-range communication device; a processor; and a memory in which computer program instructions are stored which, when executed by the processor, cause the processor to perform a check-in verification method as described above applied to the first terminal, a check-in verification method as described above applied to the second terminal, a person check-in method as described above applied to the first terminal, and a person check-in method as described above applied to the second terminal.
According to a further aspect of the present application, there is provided a computer readable medium having stored thereon computer program instructions which, when executed by a processor, cause the processor to perform a check-in verification method as described above applied to a first terminal, a check-in verification method as described above applied to a second terminal, a person check-in method as described above applied to a first terminal and a person check-in method as described above applied to a second terminal.
According to the check-in verification method, the check-in verification device and the electronic equipment, the short-distance communication identification of the second terminal is received from the second terminal of the check-in object, the short-distance communication identification is encrypted, and then the short-distance communication identification is decrypted to establish short-distance communication connection with the second terminal, so that the fact that the forged short-distance communication identification is received to be connected with other terminals except the second terminal serving as the check-in object can be avoided, and the check-in verification accuracy is guaranteed.
In addition, the check-in verification method, the check-in verification device and the electronic equipment provided by the application receive the encrypted short-distance communication signal from the second terminal through the established short-distance communication connection, decrypt the short-distance communication signal to perform check-in verification based on the identification of the check-in object, so that check-in of other objects except the check-in object is avoided, and the accuracy of the check-in verification is ensured.
In addition, the check-in verification method, the check-in verification device and the electronic equipment can use the short-distance communication between the first terminal and the second terminal to perform check-in verification, so that the equipment such as a base station for short-distance communication does not need to be additionally deployed, information is not required to be bound in the first terminal for check-in, and the check-in verification cost is reduced.
Drawings
The foregoing and other objects, features and advantages of the present application will become more apparent from the following more particular description of embodiments of the present application, as illustrated in the accompanying drawings. The accompanying drawings are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate the application and not constitute a limitation to the application. In the drawings, like reference numerals generally refer to like parts or steps.
Fig. 1 illustrates a schematic diagram of an application scenario of a check-in verification method according to an embodiment of the present application.
Fig. 2 illustrates a flowchart of a check-in verification method applied to a first terminal according to an embodiment of the present application.
FIG. 3 illustrates a flow chart of a check-in verification method according to an embodiment of the present application
Fig. 4 illustrates a schematic diagram of an application example of a check-in verification method according to an embodiment of the present application.
Fig. 5 illustrates a flowchart of a check-in verification method applied to a second terminal according to an embodiment of the present application.
Fig. 6 illustrates a flowchart of a person check-in method applied to a first terminal according to an embodiment of the present application.
Fig. 7 illustrates a flowchart of a person check-in method applied to a second terminal according to an embodiment of the present application.
Fig. 8 illustrates a schematic diagram of an application example of a person check-in method according to an embodiment of the present application.
Fig. 9 illustrates a schematic diagram of a check-in verification system according to an embodiment of the present application.
Fig. 10 illustrates a block diagram of a check-in verification apparatus applied to a first terminal according to an embodiment of the present application.
Fig. 11 illustrates a block diagram of a retail check-in verification device according to an embodiment of the present application.
Fig. 12 illustrates a block diagram of a check-in verification apparatus applied to a second terminal according to an embodiment of the present application.
Fig. 13 illustrates a block diagram of a person check-in device applied to a first terminal according to an embodiment of the present application.
Fig. 14 illustrates a block diagram of a person check-in device applied to a second terminal according to an embodiment of the present application.
Fig. 15 illustrates a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Hereinafter, example embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application and not all of the embodiments of the present application, and it should be understood that the present application is not limited by the example embodiments described herein.
Summary of the application
As described above, in order to achieve a relatively accurate check-in of a location, a check-in function may be implemented using a bluetooth natural short-range (about 10 meters) communication capability, with respect to a problem that may exist in a check-in verification process.
For example, by setting a bluetooth base station and binding information to a service person, the broadcasting information of the bluetooth base station can be detected when the service person enters the signal coverage area of the bluetooth base station, then the server is informed to check in of the service person and update the database, and the server is informed of successful check in after receiving the check-in information.
However, there is still a possibility that accurate check-in with the check-in object cannot be achieved, that is, a service person may check-in with an erroneous check-in object. Moreover, the bluetooth base station is not only high in cost, but also easy to forge, and the accuracy of sign-in cannot be guaranteed.
Moreover, if accurate check-in verification cannot be performed, there is a possibility that even if a service person checks in successfully, no service is provided to the check-in object at all, thereby seriously affecting the quality of service to the check-in object.
In view of the above technical problems, the basic idea of the present application is to connect a short-range communication with a predetermined terminal of a check-in object by receiving an encrypted short-range communication identifier, and further perform check-in verification based on the identifier of the check-in object.
Specifically, the check-in verification method, the check-in verification device and the electronic equipment are applied to a first terminal, and firstly, a short-distance communication identifier of a second terminal of a check-in object is received from the second terminal, wherein the short-distance communication identifier is encrypted; decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal; receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and decrypting the short-range communication signal to perform check-in verification based on the identification of the check-in object.
In this way, the check-in verification method, the check-in verification device and the electronic equipment provided by the application are connected with the second terminal of the check-in object by using the received encrypted short-distance communication identifier, so that the connection of the fake short-distance communication identifier with other terminals except the second terminal can be avoided, and the check-in verification accuracy is ensured.
In addition, the sign-in verification method, the sign-in verification device and the electronic equipment provided by the application receive the identification of the sign-in object, and sign-in verification is performed on the basis of the identification of the sign-in object by decrypting the short-distance communication signal, so that sign-in of objects other than the sign-in object is avoided, and accuracy of sign-in verification is ensured.
In addition, the check-in verification method, the check-in verification device and the electronic equipment can use the portable terminal with the short-distance communication function to perform verification based on short-distance communication connection, so that a short-distance communication base station is not required to be arranged, information is not required to be bound in a first terminal for check-in, and the problem of high cost of using the short-distance communication base station is solved.
Note that, in the check-in verification method, the check-in verification device, and the electronic device provided in the present application, the short-distance communication may be any communication manner capable of having a natural short-distance communication capability, including, but not limited to, bluetooth, zigbee, near field communication, and the like.
In the check-in verification method, the check-in verification device and the electronic device provided by the application, the first terminal for performing check-in may be a portable terminal of a service person who needs to perform check-in, and the second terminal of the check-in object may be a portable terminal of a served person. In addition, the first terminal for checking in may be a portable terminal of other personnel for checking in, such as logistics personnel and express personnel, or a terminal carried by an article for checking in, such as a terminal carried by a logistics article for performing short-distance communication, etc.
Accordingly, the check-in object may be a person, such as a store owner of a small store served by a service person, or an object, such as an unmanned retail store, an unmanned shelf, or the like. The second terminal to be checked-in may be a terminal for short-distance communication that is disposed in an unmanned retail store, an unmanned shelf, or the like. Therefore, the check-in verification method, the check-in verification device, and the electronic apparatus provided in the present application are not intended to make any restrictions on the first terminal to check in and the second terminal of the check-in object.
Therefore, in the check-in verification method, the check-in verification device and the electronic equipment provided by the application, the check-in includes four cases of person-to-person check-in, person-to-object check-in, object-to-person check-in and object-to-object check-in, and the application is not intended to limit the check-in scene of practical application at all.
Fig. 1 illustrates a schematic diagram of an application scenario of a check-in verification method according to an embodiment of the present application. As shown in fig. 1, the first terminal that performs check-in may be a smart phone M1 of a user U1 that performs check-in, or a vehicle C1 that performs check-in equipped with a short-range communication module. As shown in fig. 1, the second terminal to be checked-in may be a smartphone M2 of the user U2 to be checked-in, and the smartphone M2 may also accept the check-in of the vehicle C1. Further, the second terminal as the check-in target may be simply the short-distance communication tag P as the check-in target.
Having described the basic principles of the present application, various non-limiting embodiments of the present application will now be described in detail with reference to the accompanying drawings.
Exemplary method one
Fig. 2 illustrates a flowchart of a check-in verification method applied to a first terminal according to an embodiment of the present application.
The check-in verification method according to the embodiment of the application is applied to the first terminal, that is, the following steps are included and can be implemented by the first terminal. As described above, the first terminal may be a portable terminal of a service person who needs to check in, such as a smart phone, a tablet computer, or other portable terminals such as a POS machine. In addition, the first terminal may be other terminal devices mounted with a module capable of short-range communication, for example, a logistics box mounted with a bluetooth communication module, a robot, or the like.
As shown in fig. 1, the check-in verification method includes the steps of:
step S110, receiving a short-distance communication identification of a second terminal from the second terminal of the sign-in object, wherein the short-distance communication identification is encrypted. Here, the check-in verification method according to the embodiment of the present application is applied to the first terminal to be checked-in, as described above, the first terminal may be a handheld terminal of a service person to be checked-in, such as a smart phone, or may be a terminal module to be checked-in, such as a terminal module carried on an express item, such as a bluetooth module capable of performing bluetooth communication, an NFC module capable of performing near field communication, or the like.
The first terminal is to check in to the second terminal as a check-in target, and as described above, the second terminal may be a person as a check-in target, for example, a mobile terminal of a store owner of a small store served by a service person, such as a smart phone, or may be a terminal module equipped with, for example, an unmanned retail store, an unmanned shelf, or the like, to be maintained, or an article cabinet, or the like, to which an express article is to be stored, such as a bluetooth module. Correspondingly, the second terminal can be a portable terminal carried by a person, such as a smart phone, a tablet personal computer and a POS machine, and can also be a Bluetooth tag carried by a person or an object.
For sign-in, the first terminal receives an encrypted short-range communication identification of the second terminal from the second terminal. Here, the short-range communication identification of the second terminal is used for the first terminal to make a short-range communication connection with the second terminal, and in order to prevent the short-range communication identification of the second terminal from being falsified, the short-range communication identification of the second terminal is encrypted and then received by the first terminal.
The short-range communication identity of the second terminal may be the device name of the second terminal, or other identification information that can be used to identify the second terminal. In addition, the short-range communication identifier of the second terminal may not be fixed identifier information, for example, the short-range communication identifier of the second terminal may be a random number randomly generated for the check-in object each time the first terminal checks in. And, after the second terminal generates the random number, the random number is also included in the device name broadcasted via the broadcast of the short-range communication to be used as the short-range communication identification of the second terminal.
Thus, in the check-in verification method according to the embodiment of the present application, the short-range communication identification of the second terminal is a random number randomly generated for the check-in object, and the device name broadcasted by the second terminal via bluetooth broadcast includes the random number.
For the encryption method of the short-distance communication identifier, various encryption modes can be adopted. In one example, the RSA encryption algorithm may be employed for encryption for cases where the short-range communication identifier is a random number as described above. It will be appreciated by those skilled in the art that the RSA encryption algorithm is an asymmetric encryption algorithm. In the embodiment of the application, the second terminal encrypts the random number by using the private key, and prestores the public key in the first terminal, so that the private key encryption actually plays a role in signing the random number by the second terminal, and the random number obtained by decryption of the first terminal is ensured to come from the second terminal.
In addition, besides ensuring the source safety accident of the short-distance communication identification, the encrypted short-distance communication identification is adopted for transmission, so that the safety of the short-distance communication identification in the transmission process can be ensured, and the risk of the short-distance communication identification in the transmission process due to theft is correspondingly reduced.
In the check-in verification method according to the embodiment of the application, the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal.
As described above, in the check-in verification method according to the embodiment of the present application, by utilizing the short-range communication capability of the short-range communication signal, for example, the bluetooth signal, the accuracy of the check-in position location can be improved. However, since short-range communication signals, such as bluetooth signals, are relatively easy to forge, there is a need to improve security verification for short-range communication signals. Therefore, by acquiring the short-distance communication identifier of the second terminal by the first terminal in the manner of the random number encrypted by the RSA algorithm, the first terminal and the second terminal serving as the check-in object can be ensured to be in short-distance communication connection so as to check in, the condition of being connected with a fake check-in object and checking in is avoided, and the check-in accuracy is improved.
In a scene of checking in by people or people, the encrypted short-distance communication identification of the second terminal can be received from the second terminal of the checked-in object by scanning the two-dimensional code. Specifically, a random number may be first randomly generated for a person or object that is a check-in object, encrypted with a private key of the RSA algorithm, and then a two-dimensional code may be generated. Next, the service person scans the two-dimensional code to obtain an encrypted random number and decrypts the random number with a public key of the RSA algorithm to determine the second terminal to be connected to.
Thus, in the check-in verification method according to the embodiment of the present application, receiving the encrypted short-range communication identifier of the second terminal from the second terminal of the check-in object includes: scanning a two-dimensional code, wherein the two-dimensional code comprises a short-distance communication identifier of the encrypted second terminal; and decrypting the random number with the public key to obtain the short-range communication identity of the second terminal.
Step S120 decrypts the short-range communication identifier to establish a short-range communication connection with the second terminal. Taking bluetooth connection as an example, after receiving the encrypted bluetooth identifier, the first terminal decrypts the bluetooth identifier to obtain a device name of the bluetooth device to be connected, and then sends a connection request to the bluetooth device to be connected, and the bluetooth device to be connected is paired based on the received connection request. In case of successful pairing, for example, the first terminal and the second terminal have the same pairing code, a short-range communication connection is established between the first terminal and the second terminal.
Thus, the first terminal can establish a short-range communication connection with the second terminal by acquiring the encrypted short-range communication identification of the second terminal. Also, as described above, since the short-range communication connection is effective only within a short distance, it is possible to ensure that the first terminal is within a predetermined distance range of the second terminal, thereby ensuring that the first object is indeed checked-in with respect to the second terminal as a check-in object.
When the short-distance communication connection is specifically performed, the first terminal firstly starts the short-distance communication authority of the first terminal and then scans signals of nearby short-distance communication equipment. Because it is typically possible to retrieve a plurality of short-range communication devices, the first terminal may connect with a second terminal containing a random number in the device name based on the acquired short-range communication identification, e.g. a random number.
That is, in the check-in verification method according to the embodiment of the present application, connecting with the second terminal based on the short-range communication identification includes: opening the authority of short-distance communication; scanning signals of nearby short-range communication devices; and connecting with a second terminal whose device name contains a random number.
It is noted that when the first device scans for signals of nearby short-range communication devices, such as bluetooth signals, the short-range communication device name, whose device name contains a random number, may not be found, for example, due to a malfunction of the short-range communication function of the second terminal. In this way, in order to avoid a check-in failure due to a failure of the short-range communication function, check-in with a check-in object can be performed via a mode other than short-range communication in the case where the short-range communication device whose device name contains the random number is not scanned for a predetermined time.
For example, the attendant may check-in directly on a second terminal of the store owner, or other terminal for check-in. For example, the attendant may directly check-in face to face, such as by scanning a two-dimensional code on the smart phone of the store owner, or may directly operate on the smart phone of the store owner by the attendant, such as by entering a person ID number.
Thus, in the check-in verification method according to the embodiment of the present application, after scanning for the nearby short-range communication device signals, further includes: in response to not scanning for a short-range communication device whose device name contains a random number within a predetermined time, check-in with a check-in object is performed via a manner other than short-range communication.
And step S130, receiving a short-range communication signal from the second terminal via the established short-range communication connection. For example, after a first terminal establishes a bluetooth connection with a second terminal, a bluetooth signal may be received from the second terminal.
In step S140, the short-range communication signal is decrypted to perform check-in verification based on the identification of the check-in object. Taking the bluetooth signal as an example, since the bluetooth signal itself is a Service Set Identifier (SSID), by decrypting the bluetooth signal, the real information of the currently connected bluetooth device can be obtained, which information can be further used to match the identification of the check-in object. If there is a match, a check-in is indicated as successful, and if there is no match, a check-in is indicated as failed.
That is, by decrypting the short-range communication signal, identification information of the check-in object, such as a service set identifier included in the bluetooth signal itself, can be obtained. In addition, the short-distance communication signal may also include other identification information, such as a store owner ID, so that the first object can be matched with the check-in object that needs to check in, if so, the check-in is performed on the correct check-in object, and if not, the check-in is successful.
Specifically, in order to decrypt the short-range communication signal to obtain the identification of the check-in object, the second terminal needs to fuse the identification of the check-in object, such as the second terminal, in the short-range communication signal before transmitting the short-range communication signal. For example, a store owner may operate a mobile terminal to use a store ID as an identification, then encrypt the identification, and finally send the encrypted character as a bluetooth signal. In order to further improve the security of the transmission information, a time stamp may be generated, and the time stamp + the store ID may be used as an identification, then encrypted and finally transmitted as bluetooth signals with this encrypted character. Thus, the security of signing in can be remarkably improved because the timestamp and the store ID are extremely difficult to break.
In addition, as described above, in a scenario in which a serviceman registers a store owner of a small store, the serviceman may need to register a plurality of store owners at a time, in which case, in order to prevent the serviceman from completing a registration task of a plurality of small stores that need to be serviced within one small store, it is necessary to further match the identification of the registration object with the identification of the task object. For example, after obtaining the store ID of the store in which the job is currently checked in, the store ID of the store in which the job is to be checked in is further matched, thereby determining whether the job is successfully executed. Here, the store ID may be the ID of the store or the ID of the store owner. Otherwise, if the task is not successfully executed, prompting that the task needs to be continuously executed.
Thus, in a check-in verification method according to an embodiment of the present application, decrypting the short-range communication signal to perform check-in verification based on the identification of the check-in object includes: decrypting the short-range communication signal to obtain an identification of the check-in object; matching the identification of the sign-in object with the identification of the task object; and, in response to the match being successful, determining that the task was successfully performed.
And, in the above check-in verification method, decrypting the short-range communication signal to perform check-in verification based on the identification of the check-in object further includes: in response to a match failure, a prompt is made to continue to perform the task.
In addition, in the embodiment of the application, through the sign-in verification method, accurate sign-in verification can be performed through short-distance communication. However, in the check-in verification, since the communication range of the short-range communication is limited, it is first required that the first terminal enter the short-range communication range of the second terminal. Therefore, in the embodiment of the present application, the second terminal may be first located by a remote location manner, such as GPS, and then check-in verification may be performed by applying the check-in verification method according to the embodiment of the present application after reaching the range of the predetermined distance of the second terminal.
That is, in the check-in verification method according to the embodiment of the present application, before receiving the short-range communication identification of the second terminal from the second terminal of the check-in object, further includes: positioning the second terminal in a remote positioning mode; and reaching the second terminal within a predetermined distance.
Exemplary method two
Fig. 3 illustrates a flow chart of a check-in verification method according to an embodiment of the present application.
As shown in fig. 3, a check-in verification method according to an embodiment of the present application is applied to a first terminal of a retail store service person, and includes: s210, receiving a short-distance communication identification of the second terminal from the second terminal of the retail store owner, wherein the short-distance communication identification is encrypted; s220, decrypting the short-range communication identifier to establish short-range communication connection with the second terminal; s230, receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and S240, decrypting the short-range communication signal to perform check-in verification based on the identity of the retail store owner.
In the sign-in verification method, receiving the encrypted short-distance communication identifier of the second terminal from the second terminal of the retail store owner includes: scanning a two-dimensional code of a retail store owner, wherein the two-dimensional code comprises a short-distance communication identifier of a second terminal; and decrypting the random number with the public key to obtain the short-range communication identity of the second terminal.
In the above check-in verification method, decrypting the short-range communication signal to perform check-in verification based on the identification of the retail store owner includes: decrypting the short-range communication signal to obtain an identification of the retail outlet owner; matching the identification of the retail store owner with the identification of the task object; and, in response to the match being successful, determining that the task was successfully performed.
In the check-in verification method, the identification of the retail store owner includes a store owner identification of the retail store owner or a store identification of a retail store of the retail store owner.
Fig. 4 illustrates a schematic diagram of an application example of a check-in verification method according to an embodiment of the present application.
As shown in fig. 4, this application is exemplified as a scenario in which a service person checks in a store owner of a small shop using a terminal for check-in verification.
In the specific check-in process, a store owner of a small store opens a check-in page of a terminal for check-in verification, and at this time, a user ID and a time stamp are acquired for verification of the identity of the store owner. As above, for the purpose of transmission security and prevention of forgery, the transmitted bluetooth signal is encrypted, for example, with RSA encryption. Then, a two-dimensional code is generated by using the encrypted information token (for convenience of description, the encrypted information is collectively called as token here), the token is set to the name of the bluetooth device (so that other devices around can perceive the name of the bluetooth device), and finally the bluetooth broadcast is transmitted.
After the service personnel scans the two-dimensional code and analysis is successful, bluetooth is started, whether equipment with the name of a Bluetooth equipment token exists nearby is searched, and if no equipment is searched for more than a certain time (for example, 30 seconds, the closer the distance is, the faster the searching speed is), the service personnel is prompted to check in a store.
If the device of the token is searched, then the Bluetooth signal is decrypted, and finally verification of the store id is carried out, namely whether the current store id is the store id for executing the task is carried out, if so, the sign-in is successful, and if not, the corresponding store is prompted to execute the task.
It can be seen that in this application example, the check-in authentication is based on the mobile phone, and a bluetooth base station is not required to be placed, so that the cost is saved. Moreover, by encrypting the Bluetooth device name by RSA, the device signal cannot be simulated, and then by Bluetooth broadcasting, the Bluetooth device name is used as a transmission signal (different from the Bluetooth address used as the transmission signal), so that the accuracy of sign-in verification is improved.
In addition, as those skilled in the art will understand, other details of the check-in verification method according to the embodiment of the present application are identical to corresponding details in the check-in verification method according to the embodiment of the present application described in the section "exemplary method one", and will not be repeated here to avoid redundancy.
Exemplary method three
Fig. 5 illustrates a flowchart of a check-in verification method applied to a second terminal according to an embodiment of the present application.
As described above, the second terminal may be a portable terminal of a service person who is a check-in target, such as a smart phone, a tablet computer, or other portable terminals such as a POS machine. In addition, the second terminal may be other terminal devices mounted with modules capable of short-distance communication, for example, an unmanned shelf, an express cabinet, etc. mounted with a bluetooth communication module.
As shown in fig. 5, a check-in verification method applied to a second terminal according to an embodiment of the present application includes: s310, establishing short-distance communication connection with the first terminal in response to a short-distance communication connection request of the first terminal, wherein the short-distance communication connection request is based on a short-distance communication identifier of the second terminal, and the short-distance communication identifier is encrypted; s320, sending an encrypted short-range communication signal to the first terminal via the established short-range communication connection; and S330, verifying check-in by the first terminal.
In the sign-in verification method, before the short-distance communication connection is established with the first terminal in response to the short-distance communication connection request of the first terminal, the method further comprises: the device name of the second terminal is broadcasted in a broadcast manner for short-range communication, the device name containing a random number randomly generated for a check-in object corresponding to the second terminal.
In the sign-in verification method, the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal.
Here, it may be understood by those skilled in the art that other details of the check-in verification method applied to the second terminal according to the embodiment of the present application correspond to corresponding details of the check-in verification method applied to the first terminal according to the embodiment of the present application described in the section of "exemplary method one", and will not be repeated here to avoid redundancy.
Exemplary method four
Fig. 6 illustrates a flowchart of a person check-in method applied to a first terminal according to an embodiment of the present application.
As shown in fig. 6, a person check-in method applied to a first terminal according to an embodiment of the present application includes: s410, receiving, by a first terminal of a person to check in, a short-range communication identification of a second terminal from a second terminal of the person to check in, the short-range communication identification being encrypted; s420, decrypting the short-range communication identifier to establish short-range communication connection with the second terminal; s430, receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and S440, decrypting the short-range communication signal to perform check-in verification based on the identification of the check-in object.
In the above-described person check-in method, the person to be checked-in is a guide, teacher, or other management person or team member.
In the person check-in method described above, receiving, by the first terminal of the person to be checked-in, the short-range communication identification of the second terminal from the second terminal of the person to be checked-in, includes: scanning a two-dimensional code, wherein the two-dimensional code comprises a short-distance communication identifier of the second terminal.
In the person check-in method, the two-dimensional code includes a two-dimensional code displayed on a mobile terminal of a person of a check-in object or a two-dimensional code fixedly displayed at a check-in place.
That is, the check-in verification method according to the embodiment of the application can be applied to various application scenes requiring statistics of the number of people, such as employee attendance, tour guide statistics, school/company organization students, employee spring trips, and the like.
In the personnel check-in method, further comprising: storing the received short-distance communication identification of the second terminal; and establishing a short-range communication connection with the second terminal based on the stored short-range communication identification of the second terminal.
That is, in the check-in verification process, in order to facilitate check-in by a person to be checked-in, the short-distance communication identification of the second terminal may be received only at the time of the first check-in, for example, the two-dimensional code may be scanned. Then, the received short-distance communication identifier of the second terminal can be stored in the first terminal of the person to sign in, so that the stored short-distance communication identifier of the second terminal can be directly used for establishing short-distance communication connection with the second terminal in the subsequent sign-in process.
Fig. 7 illustrates a flowchart of a person check-in method applied to a second terminal according to an embodiment of the present application.
As shown in fig. 7, the person check-in method according to the embodiment of the present application is applied to a second terminal of a check-in manager, and includes: s450, establishing short-distance communication connection with a first terminal in response to a short-distance communication connection request of the first terminal, wherein the first terminal is a first terminal of a person to sign in, and the short-distance communication connection request is based on a short-distance communication identifier of a second terminal; s460 transmitting the encrypted short-range communication signal to the first terminal via the established short-range communication connection; s470, verifying a check-in signal of the first terminal, wherein the check-in signal is based on the decrypted short-range communication signal; and S480, managing personnel to check in based on the verified check-in signal.
In the above person check-in method, managing the person to be checked-in based on the verified check-in signal includes managing at least one of the following check-in information: the number of people who have checked in and/or who have not checked in; person identification of persons who have checked in and/or persons who have not checked in; the check-in time of the person who has checked in; and a historical check-in time for the person who has checked-in and/or the person who has not checked-in.
In the above person check-in method, managing the person to be checked-in based on the verified check-in signal further includes: and sending a reminding signal to the first terminal of the person who does not sign in.
In the personnel check-in method, further comprising: and displaying the check-in information on a display device of the second terminal.
Fig. 8 illustrates a schematic diagram of an application example of a person check-in method according to an embodiment of the present application.
As shown in fig. 8, when the tour guide counts the number of persons, each guest B1, B2, B3 needs to install an application or applet for executing the check-in verification method according to the embodiment of the present application on its mobile terminal P1, P2, P3 as the first terminal in the check-in verification method according to the embodiment of the present application. The tour guide B can carry the Bluetooth tag L with him or attach the Bluetooth tag for checking in at a fixed position of the tourist bus, etc.
In the check-in verification process, the tourist first scans the two-dimensional code tag (not shown in fig. 7) provided by the tour guide, such as the two-dimensional code tag carried with the tour guide or posted at a fixed location, such as the door of the tour bus, according to the check-in process described above, so as to obtain the identification information of the bluetooth device, such as the bluetooth tag L, of the tour guide to be connected. And, the two-dimensional code tag may be in the form of an application or applet pre-installed on a mobile terminal of a tour guide, such as a smart phone.
In addition, as described above, for convenience of check-in, the tourist only needs to scan the two-dimensional code tag at the time of first check-in, and then can store the scanned two-dimensional code information in his own terminal device, thereby automatically connecting and checking-in at the time of subsequent check-in.
Then, the tourist connects to the corresponding bluetooth device according to the identification, such as a bluetooth tag L carried by the tour guide or provided on the tour bus, receives the bluetooth signal from the bluetooth tag L, and decrypts the bluetooth signal to obtain the ID of the tour guide or tour bus to check in.
For example, when a attraction is reached, the tour guide may allow the visitor to go to a toilet, take a photograph, etc., or be free to move for a predetermined period of time, such as 20 minutes. After 20 minutes, the tourists are allowed to check in by accessing the Bluetooth tag L, and the tour guide can count how many tourists are already assembled, how many tourists are not already assembled, which tourists are not yet assembled and the like according to the check-in data of the Bluetooth tag. The personnel check-in method according to the embodiment of the application can be applied to a second terminal of a check-in manager as an independent management application, for example, as an application on a smart phone. Also, as described above, on the interface of the application, various information for personnel management, such as the current time, the number of current connection persons, the historic connection time of each user, the distance, and the like, may be displayed. Also, the application may have various team management functions, such as providing statistics, and initiating/alerting non-group passengers, etc.
Thus, the tour guide can conveniently count the number of people at any time in the traveling process, and through check-in verification, it is possible to know which guests have checked in and which guests have not. In addition, due to the short-distance communication characteristic of Bluetooth, false check-in of tourists can be avoided, and therefore accuracy of statistics of the number of the tourists is improved.
Here, it will be understood by those skilled in the art that other details of the person check-in method applied to the first terminal and the person check-in method applied to the second terminal according to the embodiment of the present application are identical to corresponding details of the person check-in method applied to the check-in verification method according to the embodiment of the present application described in the section "exemplary method one", and will not be repeated here to avoid redundancy.
Other application examples
In the embodiment of the application, sign-in verification should be broadly understood as verifying that any object arrives at any location, and thus has a wide application scenario.
Exemplary System
Fig. 9 illustrates a schematic diagram of a check-in verification system according to an embodiment of the present application.
As shown in fig. 9, the check-in verification system 500 according to the embodiment of the present application includes a first terminal 510 for performing check-in and a second terminal 520 corresponding to a check-in object. At 530, the first terminal 510 receives a short-range communication identity of the second terminal from the second terminal 520, the short-range communication identity being encrypted; at 540, the first terminal 510 decrypts the short-range communication identifier to establish a short-range communication connection with the second terminal 520; at 550, the first terminal 510 receives an encrypted short-range communication signal from the second terminal 520 via the established short-range communication connection; at 560, the first terminal 510 decrypts the short-range communication signal to check-in verify the second terminal 520 based on the identification of the check-in object.
Here, it will be understood by those skilled in the art that other details of the check-in verification system 500 according to the embodiment of the present application are identical to corresponding details applied in the check-in verification method according to the embodiment of the present application described in the section of "exemplary method one", and will not be repeated here to avoid redundancy.
Exemplary device one
Fig. 10 illustrates a block diagram of a check-in verification apparatus applied to a first terminal according to an embodiment of the present application.
As shown in fig. 10, a check-in verification apparatus 600 applied to a first terminal according to an embodiment of the present application includes: an identification receiving unit 610 for receiving a short-range communication identification of the second terminal from the second terminal of the check-in object, the short-range communication identification being encrypted; the connection establishment unit 620 is configured to, for decrypting short-range communication identifications for use with the second terminal establishes short-distance communication connection; a signal receiving unit 630 for receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and, the check-in verification unit 640, for decrypting the short-range communication signal for check-in verification based on the identification of the check-in object.
In one example, in the above sign-in verification apparatus 600, the short-range communication identification of the second terminal is a random number randomly generated for the sign-in object, and the device name broadcasted by the second terminal via the broadcast for short-range communication contains the random number.
In one example, in the check-in verification apparatus 600, the random number is encrypted with an RSA encryption algorithm, and a public key of the RSA encryption algorithm is pre-stored in the first terminal.
In one example, in the check-in verification apparatus 600 described above, the identification receiving unit 610 is configured to: scanning a two-dimensional code, wherein the two-dimensional code comprises a short-distance communication identifier of a second terminal; and decrypting the random number with the public key to obtain the short-range communication identity of the second terminal.
In one example, in the check-in verification apparatus 600 described above, the connection establishment unit 620 is configured to: opening the authority of short-distance communication; scanning signals of nearby short-range communication devices; and establishing a short-range communication connection with a second terminal whose device name contains a random number.
In one example, in the check-in verification apparatus 600 described above, the connection establishment unit 620 is configured to perform check-in with a check-in object via a manner other than short-range communication in response to a device including a random number not being scanned to a device name for short-range communication within a predetermined time after scanning a device signal for short-range communication in the vicinity.
In one example, in the check-in verification apparatus 600 described above, the check-in verification unit 640 is configured to: decrypting the short-range communication signal to obtain an identification of the check-in object; matching the identification of the sign-in object with the identification of the task object; and, in response to the match being successful, determining that the task was successfully performed.
In one example, in the check-in verification apparatus 600 described above, the check-in verification unit 640 further includes: in response to a match failure, a prompt is made to continue to perform the task.
In one example, in the check-in verification apparatus 600, further includes: the remote positioning unit is used for positioning the second terminal in a remote positioning mode before receiving the short-distance communication identification of the second terminal from the second terminal of the sign-in object; and reaching the second terminal within a predetermined distance.
Here, it will be understood by those skilled in the art that the specific functions and operations of the respective units and modules in the check-in verification apparatus 600 described above have been described in detail in the above description of the check-in verification method with reference to fig. 2, and thus, repetitive descriptions thereof will be omitted.
As described above, the check-in verification apparatus 600 according to the embodiment of the present application may be implemented in various terminal devices, such as a portable mobile device carried by a user, a short-range communication module carried on an article to be checked-in, and the like. In one example, check-in verification apparatus 600 according to embodiments of the present application may be integrated into a terminal device as a software module and/or hardware module. For example, the check-in verification apparatus 600 may be a software module in the operating system of the terminal device, or may be an application developed for the terminal device; of course, the check-in verification device 600 may also be one of a plurality of hardware modules of the terminal device.
Alternatively, in another example, the check-in verification apparatus 600 and the terminal device may be separate devices, and the check-in verification apparatus 600 may be connected to the terminal device through a wired and/or wireless network and transmit the interaction information in a agreed data format.
Exemplary device two
Fig. 11 illustrates a block diagram of a check-in verification device according to an embodiment of the present application.
As shown in fig. 11, a check-in verification apparatus 700 according to an embodiment of the present application is applied to a first terminal of a retail store attendant, and includes: an identification receiving unit 710 for receiving a short-range communication identification of the second terminal from the second terminal of the retail store owner, the short-range communication identification being encrypted; a connection establishment unit 720 for decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal; a signal receiving unit 730 for receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and a check-in verification unit 740 for decrypting the short-range communication signal to perform check-in verification based on the identification of the retail store owner.
In one example, in the check-in verification apparatus 700 described above, the identification receiving unit 710 is configured to: scanning a two-dimensional code of a retail store owner, wherein the two-dimensional code comprises a short-distance communication identifier of a second terminal; and decrypting the random number with the public key to obtain the short-range communication identity of the second terminal.
In one example, in the check-in verification apparatus 700 described above, the check-in verification unit 740 is configured to: decrypting the short-range communication signal to obtain an identification of the retail outlet owner; matching the identification of the retail store owner with the identification of the task object; and, in response to the match being successful, determining that the task was successfully performed.
In one example, in the check-in verification apparatus 700 described above, the identity of the retail store owner includes the store owner identity of the retail store owner or the store identity of the retail store owner.
Here, it will be understood by those skilled in the art that other details of the check-in verification device 700 according to the embodiment of the present application are identical to corresponding details in the retail check-in verification method according to the embodiment of the present application described in the section "exemplary method two", and will not be repeated here to avoid redundancy.
Exemplary device three
Fig. 12 illustrates a block diagram of a check-in verification apparatus applied to a second terminal according to an embodiment of the present application.
As shown in fig. 12, a check-in verification apparatus 800 applied to a second terminal according to an embodiment of the present application includes: a connection establishment unit 810 for establishing a short-range communication connection with the first terminal in response to a short-range communication connection request of the first terminal, the short-range communication connection request being based on a short-range communication identification of the second terminal, the short-range communication identification being encrypted; a signal transmitting unit 820 for transmitting an encrypted short-range communication signal to the first terminal via the established short-range communication connection; and a check-in verification unit 830 for verifying the check-in performed by the first terminal.
In one example, in the check-in verification apparatus 800, further includes: and a device broadcasting unit configured to broadcast a device name of the second terminal in a broadcast manner for short-range communication before a short-range communication connection is established with the first terminal in response to a short-range communication connection request of the first terminal, the device name including a random number randomly generated for a check-in object corresponding to the second terminal.
In one example, in the check-in verification apparatus 800, the random number is encrypted with an RSA encryption algorithm, and a public key of the RSA encryption algorithm is pre-stored in the first terminal.
Here, it can be understood by those skilled in the art that other details of the check-in verification apparatus 800 applied to the second terminal according to the embodiment of the present application are identical to those of the check-in verification method applied to the second terminal according to the embodiment of the present application described in the section "exemplary method three", and will not be repeated here to avoid redundancy.
Exemplary device four
Fig. 13 illustrates a block diagram of a person check-in device applied to a first terminal according to an embodiment of the present application.
As shown in fig. 13, a person check-in device 900 according to an embodiment of the present application includes: an identification receiving unit 910 for receiving, by a first terminal of a person to be checked-in, a short-range communication identification of a second terminal from a second terminal of a person of a check-in object, the short-range communication identification being encrypted; a connection establishment unit 920 configured to decrypt the short-range communication identifier to establish a short-range communication connection with the second terminal; a signal receiving unit 930 for receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and a check-in verification unit 940 for decrypting the short-range communication signal to perform check-in verification based on the identification of the check-in object.
In one example, in the above-described person check-in device 900, the person of the check-in object is a tour guide, teacher, or other management or team member.
In one example, in the person check-in apparatus 900 described above, the identification receiving unit 910 is configured to: scanning a two-dimensional code, wherein the two-dimensional code comprises a short-distance communication identifier of the second terminal.
In one example, in the person check-in apparatus 900, the two-dimensional code includes a two-dimensional code displayed on a mobile terminal of a person of a check-in object or a two-dimensional code fixedly displayed at a check-in place.
In one example, in the person check-in device 900, further includes: an identifier storage unit, configured to store the received short-distance communication identifier of the second terminal; and the connection establishment unit is used for establishing short-distance communication connection with the second terminal based on the stored short-distance communication identification of the second terminal.
Here, it can be understood by those skilled in the art that other details of the person check-in device 900 according to the embodiment of the present application are identical to corresponding details of the person check-in method applied to the first terminal according to the embodiment of the present application described in the section "exemplary method four", and will not be repeated here to avoid redundancy.
Fig. 14 illustrates a block diagram of a person check-in device applied to a second terminal according to an embodiment of the present application.
As shown in fig. 14, a person check-in device 1000 according to an embodiment of the present application is applied to a second terminal of a check-in manager, and includes: a connection establishment unit 1010 configured to establish a short-range communication connection with a first terminal in response to a short-range communication connection request of the first terminal, the first terminal being a first terminal of a person to sign in, the short-range communication connection request being based on a short-range communication identification of the second terminal; a signal transmitting unit 1020 for transmitting an encrypted short-range communication signal to the first terminal via the established short-range communication connection; a check-in verification unit 1030 for verifying a check-in signal of the first terminal, the check-in signal being based on the decrypted short-range communication signal; and a person management unit 1040 for managing persons to check in based on the verified check-in signal.
In one example, in the above-mentioned person check-in apparatus 1000, the person management unit is configured to manage at least one of the following check-in information: the number of people who have checked in and/or who have not checked in; person identification of persons who have checked in and/or persons who have not checked in; the check-in time of the person who has checked in; and a historical check-in time for the person who has checked-in and/or the person who has not checked-in.
In one example, in the above-mentioned person check-in device 1000, the person management unit is further configured to: and sending a reminding signal to the first terminal of the person who does not sign in.
In one example, in the person check-in device 1000, further includes: and the information display unit is used for displaying the check-in information on the display equipment of the second terminal.
Here, it can be understood by those skilled in the art that other details of the person check-in device 1000 according to the embodiment of the present application are identical to corresponding details of the person check-in method applied to the second terminal according to the embodiment of the present application described in the section "exemplary method four", and will not be repeated here to avoid redundancy.
Exemplary electronic device
Next, an electronic apparatus according to an embodiment of the present application is described with reference to fig. 15.
Fig. 15 illustrates a block diagram of an electronic device according to an embodiment of the present application.
As shown in fig. 15, the electronic device 10 includes one or more processors 11 and a memory 12.
The processor 13 may be a Central Processing Unit (CPU) or other form of processing unit having data processing and/or instruction execution capabilities, and may control other components in the electronic device 10 to perform desired functions.
In one example, the electronic device 10 may further include: an input device 13 and an output device 14, which are interconnected by a bus system and/or other forms of connection mechanisms (not shown).
The input means 13 may comprise, for example, a keyboard, a mouse, etc.
The output device 14 may output various information to the outside, including check-in verification results and the like. The output means 14 may include, for example, a display, speakers, a printer, and a communication network and remote output devices connected thereto, etc.
In addition, the electronic device 10 further comprises short-range communication means 15 for short-range communication with other electronic devices, such as bluetooth communication, zigbee communication, near field communication, etc. The short-range communication relay 15 may be implemented as a specific communication module in the electronic device 10, such as a bluetooth communication module, a Zigbee communication module, a near field communication module, etc.
Of course, only some of the components of the electronic device 10 that are relevant to the present application are shown in fig. 12 for simplicity, components such as buses, input/output interfaces, etc. are omitted. In addition, the electronic device 10 may include any other suitable components depending on the particular application.
Exemplary computer program product and computer readable storage Medium
In addition to the methods and apparatus described above, embodiments of the present application may also be a computer program product comprising computer program instructions which, when executed by a processor, cause the processor to perform the steps in a check-in verification method, a retail check-in verification method, a check-in verification method and a person check-in method applied to a first terminal according to various embodiments of the present application described in the above "exemplary methods" section of the present application.
The computer program product may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the first user computing device, partly on the first user device, as a stand-alone software package, partly on the first user computing device, partly on a remote computing device, or entirely on a remote computing device or server.
Furthermore, embodiments of the present application may also be a computer-readable storage medium, on which computer program instructions are stored, which when executed by a processor, cause the processor to perform the steps in a check-in verification method, a retail check-in verification method, a check-in verification method, and a person check-in method applied to a second terminal according to various embodiments of the present application described in the above "exemplary methods" section of the present application.
A computer readable storage medium may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may include, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The basic principles of the present application have been described above in connection with specific embodiments, however, it should be noted that the advantages, benefits, effects, etc. mentioned in the present application are merely examples and not limiting, and these advantages, benefits, effects, etc. are not to be considered as necessarily possessed by the various embodiments of the present application. Furthermore, the specific details disclosed herein are for purposes of illustration and understanding only, and are not intended to be limiting, as the application is not intended to be limited to the details disclosed herein as such.
The block diagrams of the devices, apparatuses, devices, systems referred to in this application are only illustrative examples and are not intended to require or imply that the connections, arrangements, configurations must be made in the manner shown in the block diagrams. As will be appreciated by one of skill in the art, the devices, apparatuses, devices, systems may be connected, arranged, configured in any manner. Words such as "including," "comprising," "having," and the like are words of openness and mean "including but not limited to," and are used interchangeably therewith. The terms "or" and "as used herein refer to and are used interchangeably with the term" and/or "unless the context clearly indicates otherwise. The term "such as" as used herein refers to, and is used interchangeably with, the phrase "such as, but not limited to.
It is also noted that in the apparatus, devices and methods of the present application, the components or steps may be disassembled and/or assembled. Such decomposition and/or recombination should be considered as equivalent to the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, this description is not intended to limit the embodiments of the application to the form disclosed herein. Although a number of example aspects and embodiments have been discussed above, a person of ordinary skill in the art will recognize certain variations, modifications, alterations, additions, and subcombinations thereof.
Claims (26)
1. A sign-in verification method applied to a first terminal, comprising:
receiving a short-range communication identification of a second terminal from the second terminal of a check-in object, wherein the short-range communication identification is encrypted;
Decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal;
receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and
decrypting the short-range communication signal to perform check-in verification based on the identification of the check-in object; wherein the short-range communication identification of the second terminal is a random number randomly generated for the check-in object, and the second terminal includes the random number via a device name broadcasted by a broadcast for short-range communication; decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal includes:
opening the authority of short-distance communication;
scanning signals of nearby short-range communication devices; and
establishing short-distance communication connection with the second terminal with the equipment name containing the random number; the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal.
2. The check-in verification method according to claim 1, wherein receiving the encrypted short-range communication identification of the second terminal from the second terminal of the check-in object comprises:
Scanning a two-dimensional code, wherein the two-dimensional code comprises a short-distance communication identifier of the second terminal; and
decrypting the random number with the public key to obtain a short-range communication identifier of the second terminal.
3. The check-in verification method according to claim 1, further comprising, after scanning for a nearby device signal for short-range communication:
in response to a device not scanning for a short-range communication whose device name contains the random number within a predetermined time, check-in with the check-in object is performed via a manner other than the short-range communication.
4. The check-in verification method according to claim 1, further comprising, before receiving a short-range communication identification of a second terminal of a check-in object from the second terminal:
positioning the second terminal in a remote positioning mode; and
reaching the second terminal within a predetermined distance.
5. A check-in verification method applied to a first terminal of a retail store attendant, comprising:
receiving a short-range communication identification of a second terminal from a second terminal of a retail store owner, the short-range communication identification being encrypted;
Decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal;
receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and
decrypting the short-range communication signal to verify check-in based on the identity of the retail store owner;
wherein the short-range communication identification of the second terminal is a random number randomly generated for the retail store owner, and the second terminal includes the random number via a device name broadcast by a broadcast for short-range communication; the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal.
6. The check-in verification method of claim 5, wherein receiving the encrypted short-range communication identification of the second terminal from the second terminal of the retail outlet owner comprises:
scanning a two-dimensional code of the retail store owner, wherein the two-dimensional code comprises a short-distance communication identifier of the second terminal; and
decrypting the random number with the public key to obtain a short-range communication identifier of the second terminal.
7. The check-in verification method of claim 6, wherein decrypting the short-range communication signal to check-in verification based on the identity of the retail outlet owner comprises:
Decrypting the short-range communication signal to obtain an identification of the retail outlet owner;
matching the identification of the retail store owner with the identification of the task object; and
in response to the match being successful, a determination is made that the task was successfully performed.
8. The check-in verification method of claim 7, wherein the identity of the retail store owner comprises a store owner identity of the retail store owner or a store identity of a retail store of the retail store owner.
9. A check-in verification method applied to a second terminal, comprising:
establishing a short-range communication connection with a first terminal in response to a short-range communication connection request of the first terminal, the short-range communication connection request being based on a short-range communication identification of the second terminal, the short-range communication identification being encrypted;
transmitting an encrypted short-range communication signal to the first terminal via the established short-range communication connection; and
verifying check-in performed by the first terminal;
the short-distance communication identifier of the second terminal is a random number which is randomly generated aiming at a sign-in object corresponding to the second terminal;
the method further comprises the following steps before the short-distance communication connection request of the first terminal is responded, wherein the short-distance communication connection is established with the first terminal:
Broadcasting a device name of the second terminal in a broadcasting manner for short-range communication, the device name including the random number; the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal.
10. A check-in verification system, comprising:
the first terminal is used for signing in; and
the second terminal corresponds to the sign-in object;
the first terminal is configured to receive a short-range communication identifier of the second terminal from the second terminal, where the short-range communication identifier is encrypted; decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal; receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and decrypting the short-range communication signal to perform check-in verification based on the identification of the check-in object;
wherein the short-range communication identification of the second terminal is a random number randomly generated for the check-in object, and the second terminal includes the random number via a device name broadcasted by a broadcast for short-range communication; the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal;
Decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal includes:
opening the authority of short-distance communication;
scanning signals of nearby short-range communication devices; and
and establishing short-distance communication connection with the second terminal with the equipment name containing the random number.
11. The personnel check-in method is applied to a first terminal of a personnel to be checked in and is characterized by comprising the following steps:
receiving, by the first terminal, a short-range communication identification of a person who checked in to the object from a second terminal of the second terminal, the short-range communication identification being encrypted;
decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal;
receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and
decrypting the short-range communication signal to perform check-in verification based on the identification of the check-in object;
wherein the short-range communication identification of the second terminal is a random number randomly generated for the check-in object, and the second terminal includes the random number via a device name broadcasted by a broadcast for short-range communication; the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal;
Decrypting the short-range communication identifier to establish a short-range communication connection with the second terminal includes:
opening the authority of short-distance communication;
scanning signals of nearby short-range communication devices; and
and establishing short-distance communication connection with the second terminal with the equipment name containing the random number.
12. The person check-in method according to claim 11, wherein the person of the check-in object is a tour guide, teacher, or other manager or team member.
13. The person check-in method according to claim 11, wherein receiving, by a first terminal of a person to be checked-in, a short-range communication identification of a second terminal of a person of a check-in object from the second terminal comprises:
scanning a two-dimensional code, wherein the two-dimensional code comprises a short-distance communication identifier of the second terminal.
14. The person check-in method according to claim 13, wherein the two-dimensional code includes a two-dimensional code displayed on a mobile terminal of a person of the check-in object or a two-dimensional code fixedly displayed at a check-in place.
15. The person check-in method of claim 11, further comprising:
Storing the received short-distance communication identification of the second terminal; and
and establishing short-distance communication connection with the second terminal based on the stored short-distance communication identification of the second terminal.
16. The personnel check-in method is applied to a second terminal of a check-in manager and is characterized by comprising the following steps of:
establishing a short-range communication connection with a first terminal in response to a short-range communication connection request of the first terminal, the first terminal being a first terminal of a person to sign in, the short-range communication connection request being based on a short-range communication identification of the second terminal, the short-range communication identification being encrypted;
transmitting an encrypted short-range communication signal to the first terminal via the established short-range communication connection;
verifying a check-in signal of the first terminal, the check-in signal being based on the decrypted short-range communication signal;
and
Managing a person to check in based on the verified check-in signal;
the short-distance communication identifier of the second terminal is a random number which is randomly generated for the sign-in manager; the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal;
The method further comprises the following steps before the short-distance communication connection request of the first terminal is responded, wherein the short-distance communication connection is established with the first terminal:
broadcasting a device name of the second terminal in a broadcasting manner for short-range communication, the device name including the random number.
17. The person check-in method of claim 16, wherein managing a person to check-in based on the verified check-in signal comprises managing at least one of the following check-in information:
the number of people who have checked in and/or who have not checked in;
person identification of persons who have checked in and/or persons who have not checked in;
the check-in time of the person who has checked in;
historical check-in times for people who have checked-in and/or people who have not checked-in.
18. The person check-in method of claim 17, wherein managing the person to check-in based on the verified check-in signal further comprises:
and sending a reminding signal to the first terminal of the person who does not sign in.
19. The person check-in method of claim 17, further comprising:
And displaying the check-in information on a display device of the second terminal.
20. A check-in verification device applied to a first terminal, comprising:
an identification receiving unit configured to receive a short-range communication identification of a second terminal of a check-in object from the second terminal, the short-range communication identification being encrypted;
a connection establishment unit configured to decrypt the short-range communication identifier to establish a short-range communication connection with the second terminal;
a signal receiving unit for receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and
a check-in verification unit configured to decrypt the short-range communication signal to perform check-in verification based on the identification of the check-in object;
wherein the short-range communication identification of the second terminal is a random number randomly generated for the check-in object, and the second terminal includes the random number via a device name broadcasted by a broadcast for short-range communication; the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal;
the connection establishment unit is specifically used for opening the permission of short-distance communication; scanning signals of nearby short-range communication devices; and establishing a short-range communication connection with the second terminal of which the device name contains the random number.
21. A check-in verification apparatus for a first terminal of a retail store attendant, comprising:
an identification receiving unit for receiving a short-range communication identification of a second terminal from a second terminal of a retail store owner, the short-range communication identification being encrypted;
a connection establishment unit configured to decrypt the short-range communication identifier to establish a short-range communication connection with the second terminal;
a signal receiving unit for receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and
a check-in verification unit for decrypting the short-range communication signal to perform check-in verification based on the identity of the retail store owner;
wherein the short-range communication identification of the second terminal is a random number randomly generated for the retail store owner, and the second terminal includes the random number via a device name broadcast by a broadcast for short-range communication; the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal.
22. A check-in verification apparatus applied to a second terminal, comprising:
A connection establishing unit configured to establish a short-range communication connection with a first terminal in response to a short-range communication connection request of the first terminal, the short-range communication connection request being based on a short-range communication identification of the second terminal, the short-range communication identification being encrypted;
a signal transmitting unit configured to transmit an encrypted short-range communication signal to the first terminal via the established short-range communication connection; and
the sign-in verification unit is used for verifying sign-in performed by the first terminal;
the short-distance communication identifier of the second terminal is a random number which is randomly generated aiming at a sign-in object corresponding to the second terminal; the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal;
and a device broadcasting unit configured to broadcast a device name of the second terminal in a broadcast manner for short-range communication, the device name including the random number, before a short-range communication connection is established with the first terminal in response to a short-range communication connection request of the first terminal.
23. A person check-in device applied to a first terminal of a person to be checked in, comprising:
An identification receiving unit for receiving, by the first terminal, a short-range communication identification of a person who is a sign-in object from a second terminal of the second terminal, the short-range communication identification being encrypted;
a connection establishment unit configured to decrypt the short-range communication identifier to establish a short-range communication connection with the second terminal;
a signal receiving unit for receiving an encrypted short-range communication signal from the second terminal via the established short-range communication connection; and
a check-in verification unit configured to decrypt the short-range communication signal to perform check-in verification based on the identification of the check-in object;
wherein the short-range communication identification of the second terminal is a random number randomly generated for the check-in object, and the second terminal includes the random number via a device name broadcasted by a broadcast for short-range communication; the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal;
the connection establishment unit is specifically used for opening the permission of short-distance communication; scanning signals of nearby short-range communication devices; establishing short-distance communication connection with the second terminal with the equipment name containing the random number;
And a device broadcasting unit configured to broadcast a device name of the second terminal in a broadcast manner for short-range communication, the device name including the random number, before a short-range communication connection is established with the first terminal in response to a short-range communication connection request of the first terminal.
24. A person check-in device applied to a second terminal of a check-in manager, comprising:
a connection establishing unit configured to establish a short-range communication connection with a first terminal in response to a short-range communication connection request of the first terminal, the first terminal being a first terminal of a person to sign in, the short-range communication connection request being based on a short-range communication identification of the second terminal, the short-range communication identification being encrypted;
a signal transmitting unit configured to transmit an encrypted short-range communication signal to the first terminal via the established short-range communication connection;
a check-in verification unit configured to verify a check-in signal of the first terminal, the check-in signal being based on the decrypted short-range communication signal; and
a person management unit configured to manage a person to check in based on the verified check-in signal;
The short-distance communication identifier of the second terminal is a random number which is randomly generated for the sign-in manager; the random number is encrypted by an RSA encryption algorithm, and a public key of the RSA encryption algorithm is prestored in the first terminal;
and a device broadcasting unit configured to broadcast a device name of the second terminal in a broadcast manner for short-range communication, the device name including the random number, before a short-range communication connection is established with the first terminal in response to a short-range communication connection request of the first terminal.
25. An electronic device, comprising:
a short-range communication device;
a processor; and
a memory in which computer program instructions are stored which, when executed by the processor, cause the processor to perform the check-in verification method of any one of claims 1 to 4, the check-in verification method of any one of claims 5 to 8, the check-in verification method of claim 9, the person check-in method of any one of claims 11 to 15 and the person check-in method of any one of claims 16 to 19.
26. A computer readable medium having stored thereon computer program instructions which, when executed by a processor, cause the processor to perform the check-in verification method of any of claims 1-4, the check-in verification method of any of claims 5-8, the check-in verification method of claim 9, the person check-in method of any of claims 11-15 and the person check-in method of any of claims 16-19.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010026470.0A CN113129466B (en) | 2020-01-10 | 2020-01-10 | Check-in verification method, check-in verification device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010026470.0A CN113129466B (en) | 2020-01-10 | 2020-01-10 | Check-in verification method, check-in verification device and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113129466A CN113129466A (en) | 2021-07-16 |
CN113129466B true CN113129466B (en) | 2023-06-27 |
Family
ID=76771441
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010026470.0A Active CN113129466B (en) | 2020-01-10 | 2020-01-10 | Check-in verification method, check-in verification device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113129466B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1666469A (en) * | 2002-06-29 | 2005-09-07 | 皇家飞利浦电子股份有限公司 | Bluetooth remote access device |
JP2015158838A (en) * | 2014-02-25 | 2015-09-03 | シャープ株式会社 | Portable terminal device, authentication server, and authentication system |
US9710980B1 (en) * | 2016-05-20 | 2017-07-18 | Nasser Alzahrani | Biometric attendance tracking system and method using mobile devices |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101237704A (en) * | 2008-02-28 | 2008-08-06 | 中兴通讯股份有限公司 | An attendance checking method and system based on mobile communication technology |
US8583933B2 (en) * | 2011-12-23 | 2013-11-12 | Ebay Inc. | Authenticated checkin via passive NFC |
CN105894634B (en) * | 2016-04-20 | 2018-10-26 | 杭州攻壳科技有限公司 | A kind of identification system and method |
US20170364901A1 (en) * | 2016-06-19 | 2017-12-21 | Google Inc. | Identifying user computing device specific locations |
CN108307361A (en) * | 2016-09-06 | 2018-07-20 | 北京搜狗科技发展有限公司 | A kind of short-distance wireless communication method and device |
US10536450B2 (en) * | 2017-04-18 | 2020-01-14 | Microsoft Technology Licensing, Llc. | Personal identifier sign-in for organizational users |
CN107195007B (en) * | 2017-05-22 | 2019-12-24 | 何雨航 | Bluetooth sign-in method and system based on scene |
CN110062323A (en) * | 2018-12-31 | 2019-07-26 | 王伟涛 | Identification information sending device, user terminal, server, localization method and its system |
-
2020
- 2020-01-10 CN CN202010026470.0A patent/CN113129466B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1666469A (en) * | 2002-06-29 | 2005-09-07 | 皇家飞利浦电子股份有限公司 | Bluetooth remote access device |
JP2015158838A (en) * | 2014-02-25 | 2015-09-03 | シャープ株式会社 | Portable terminal device, authentication server, and authentication system |
US9710980B1 (en) * | 2016-05-20 | 2017-07-18 | Nasser Alzahrani | Biometric attendance tracking system and method using mobile devices |
Also Published As
Publication number | Publication date |
---|---|
CN113129466A (en) | 2021-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190058591A1 (en) | Systems and methods of providing and electronically validating tickets and tokens | |
EP2245790B1 (en) | Authentication mechanisms for wireless networks | |
US20190014443A1 (en) | Building occupant tracker | |
KR101296137B1 (en) | A mobile phone id card security methods and system by the using of qr code | |
US11488427B2 (en) | Authentication method for authenticating that target vehicle is vehicle of which dispatch has been reserved in dispatch system, storage medium, server, and dispatch system | |
CN104780043A (en) | Access control method and system based on two-dimension code | |
JP7356216B2 (en) | Mobile credential management system and management method | |
CN103548401A (en) | Service enhancements using near field communication | |
TW201424326A (en) | System and method for location-based authentication | |
JP7235258B2 (en) | GENERATOR OF GENUINE AUTHENTICATION CONTENT AND INTEGRATED AUTHENTICATION SYSTEM USING THE SAME | |
US20210407230A1 (en) | A system of seamless automated customer id verification at the hotel entrance and releasing the hotel room key | |
CN112888955A (en) | Authenticated device, authentication request transmission method, authentication method, and program | |
JP2007148471A (en) | Service notification system | |
CN110402590B (en) | Authentication system for at least partially autonomous vehicles | |
US11928201B2 (en) | Mobile credential with online/offline delivery | |
JP6682397B2 (en) | Entrance / exit system and entrance / exit control method | |
US20240013267A1 (en) | System for the fully automated acquisition of tickets | |
CN113129466B (en) | Check-in verification method, check-in verification device and electronic equipment | |
JP2017027249A (en) | Electronic authentication system and electronic authentication method, as well as electronic authentication program | |
JP2021170758A (en) | Device to be authenticated, authentication device, authentication request transmission method, authentication method, and program | |
JP2008276603A (en) | Authentication system and determination method | |
WO2018213198A1 (en) | Systems and methods of providing and electronically validating tickets and tokens | |
KR20170069556A (en) | Automatic attendance and absence management server and control method thereof, and device and recording media for managing automatic attendance and absence | |
US20200260270A1 (en) | Mobile Identificaton Using Thing Client Devices | |
US20190097803A1 (en) | Encrypted reverse biometric token validation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |